메뉴 건너뛰기




Volumn , Issue , 2012, Pages 330-335

Malicious ramp-induced temporal data attack in power market with look-ahead dispatch

Author keywords

[No Author keywords available]

Indexed keywords

CYBER-ATTACKS; ECONOMIC IMPACTS; ELECTRICITY MARKET OPERATIONS; FINANCIAL ARBITRAGE; GENERATION CAPACITY; POWER MARKETS; RAMP CONSTRAINTS; TEMPORAL DATA;

EID: 84876017888     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SmartGridComm.2012.6486005     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 1
    • 84874173102 scopus 로고    scopus 로고
    • Cyber-physical system security for the electric power grid
    • S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system security for the electric power grid, " Proceedings of the IEEE, vol. 99, no. 1, pp. 1-15, 2012.
    • (2012) Proceedings of the IEEE , vol.99 , Issue.1 , pp. 1-15
    • Sridhar, S.1    Hahn, A.2    Govindarasu, M.3
  • 3
    • 79954575826 scopus 로고    scopus 로고
    • Malicious data attacks on smart grid state estimation: Attack strategies and Countermeasures
    • Gaithersburg, MD, Oct
    • O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and Countermeasures, " in Proceedings of First IEEE Smart Grid Communication Conference, Gaithersburg, MD, Oct 2010, pp. 220-225.
    • (2010) Proceedings of First IEEE Smart Grid Communication Conference , pp. 220-225
    • Kosut, O.1    Jia, L.2    Thomas, R.3    Tong, L.4
  • 4
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • June
    • T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids, " IEEE Transactions on Smart Grid, vol. 3, no. 2, pp. 326-333, June 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.3 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 8
    • 82155175605 scopus 로고    scopus 로고
    • Integrity data attacks in power market operations
    • Dec
    • L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations, " IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659-666, Dec 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.4 , pp. 659-666
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 12
    • 84876015254 scopus 로고    scopus 로고
    • Functional description of core market management system (MMS) applications for look-ahead SCED
    • ERCOT
    • ERCOT, "Functional description of core market management system (MMS) applications for look-ahead SCED, " White paper, 2011.
    • (2011) White Paper
  • 14
    • 70349180695 scopus 로고    scopus 로고
    • Capacity withholding in restructured wholesale power markets: An agent-based test bed study
    • Mar
    • H. Li and L. Tesfatsion, "Capacity withholding in restructured wholesale power markets: An agent-based test bed study, " in Proceedings of Power System Conference and Exposition, Mar 2009.
    • (2009) Proceedings of Power System Conference and Exposition
    • Li, H.1    Tesfatsion, L.2
  • 15
    • 36348967842 scopus 로고    scopus 로고
    • Agent-based analysis of capacity withholding and tacit collusion in electricity markets
    • Nov
    • A. Tellidou and A. Bakirtzis, "Agent-based analysis of capacity withholding and tacit collusion in electricity markets, " IEEE Transactions on Power Systems, vol. 22, no. 4, p. 17351742, Nov 2007.
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.4 , pp. 1735-1742
    • Tellidou, A.1    Bakirtzis, A.2
  • 16
    • 27144453382 scopus 로고    scopus 로고
    • Folk theorems on transmission access: Proofs and counterexamples
    • Jul
    • F. F. Wu, P. Varaiya, P. Spiller, and S. Oren, "Folk theorems on transmission access: proofs and counterexamples, " Journal of Regulatory Economics, vol. 10, no. 1, pp. 5-23, Jul 1996.
    • (1996) Journal of Regulatory Economics , vol.10 , Issue.1 , pp. 5-23
    • Wu, F.F.1    Varaiya, P.2    Spiller, P.3    Oren, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.